Update threat-model-series-contraceptive-pills.md

Changed mistakes

Signed-off-by: Kevin Pham <123699355+kpham42@users.noreply.github.com>
This commit is contained in:
Kevin Pham 2025-03-25 17:02:56 -04:00 committed by GitHub
parent e9166ec7db
commit 7cc9d46180
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -75,7 +75,7 @@ After constructing a threat model, Sally and Alex starts reviewing potential act
### Solution 1: Legal Compliance
The couple honors the legal restrictions in Louisiana. Since circumvention may lead to unwanted attention, they may consider moving to another jurisdiction, such as another state or country, after Sally finishes medical school. While this solution would be safer for the couple, Sally might need to endure unintended health consquences or an unwanted pregnancy if she could not access reliable contraceptives.
The couple honors the legal restrictions in Texas. Since circumvention may lead to unwanted attention, they may consider moving to another jurisdiction, such as another state or country, after Sally finishes medical school. While this solution would be safer for the couple, Sally might need to endure unintended health consquences or an unwanted pregnancy if she could not access reliable contraceptives.
### Solution 2: Active Preparation
@ -83,4 +83,4 @@ To address the impending legal restrictions, Sally can begin purchasing contrace
### Solution 3: Anonymous Circumvention
If a state ban on contraceptives takes place, Sally can utilize anonymous payment methods and end-to-end encrypted messaging apps to discreetly obtain contraceptives. Using [Tor Browser](https://www.privacyguides.org/en/tor/) enables her to access online pharmacies without revealing her identity or location, effectively circumventing state restrictions. Additionally, she can adopt [Monero](https://www.privacyguides.org/en/cryptocurrency/), a cryptocurrency designed for anonymous transactions, to make transactions without leaving a trace. For secure communication with loved ones about her situation, Sally can use [Signal](https://www.privacyguides.org/en/real-time-communication/#encrypted-messengers), an encrypted messaging app that protects her conversations from surveillance. By choosing these privacy tools during a state ban, Sally can safeguard her personal safety while minimizing the risk of legal repercussions. However, this approach is dangerous and may cause additional harm.
If a state contraceptive registry is created, Sally can utilize anonymous payment methods and end-to-end encrypted messaging apps to discreetly obtain contraceptives. Using [Tor Browser](https://www.privacyguides.org/en/tor/) enables her to access online pharmacies without revealing her identity or location, effectively circumventing state restrictions. Additionally, she can adopt [Monero](https://www.privacyguides.org/en/cryptocurrency/), a cryptocurrency designed for anonymous transactions, to make transactions without leaving a trace. For secure communication with loved ones about her situation, Sally can use [Signal](https://www.privacyguides.org/en/real-time-communication/#encrypted-messengers), an encrypted messaging app that protects her conversations from surveillance. By choosing these privacy tools during a state ban, Sally can safeguard her personal safety while minimizing the risk of legal repercussions. However, this approach is dangerous and may cause additional harm.